Memo - Essay Example

Only on StudentShare

Extract of sample

I've prepared an analysis about the use of vulnerability assessment systems and intrusion detection systems in your company, just like you asked me. You specifically asked whether the use of both systems will be a waste of resources and a duplication of efforts. My analysis suggests that VAS and IDS have separate internal functions for the security of the computer systems and both must be a part of a computer system for complete security control.
Vulnerability assessment systems are those security scanning tools that assess level of threat that can penetrate a system. The main job of such tools is to scan networks, servers, firewalls, routers, and applications and report system vulnerabilities. "Generally, the tools can detect known security flaws or bugs in software and hardware, determine if the systems are susceptible to known attacks and exploits, and search for system vulnerabilities such as settings contrary to established security policies". (Becker, 1999)
New threats are discovered each day thus the vulnerability assessment tools must be updated regularly. Any new weaknesses such as security flaws and bugs would need to be patched in the system so that no holes left for malwares, viruses, spywares etc. to infect the system. ...
Download paper


Up at the St Gregory Country Club, my friend Walter "Wally" Gropius was telling me about how they use intrusion detection systems at MalaFide Corporation where he's the CEO to identify all attacks on their computer networks. So before I approve this request for vulnerability assessment systems, I'd like to understand why we are duplicating efforts here…
Author : itremblay



Related Essays

Interoffice Memo
I do believe that law enforcement agents can be an asset in this field of investigation where digital evidence need to be handled with care much like any physical evidence should be handled in order to be assured that evidence would not be tampered with from the time it is collected unto the time that the evidence is used in court....
8 pages (2008 words) Essay
Memo Editing
1. Making the Most of Computers. Review of computer operations and provides hands-on experience in using the company's four main software packages: word processing, spreadsheet; data-base management and graphics....
4 pages (1004 words) Essay
Recommendation Memo
The gaming consoles are judged on five different criterions based on the information extracted from user reviews from, the gaming console's respective websites and from the general public opinion and perception of the brands. The five criterions are...
4 pages (1004 words) Research Paper
Memo to Manager
The giving of inexpensive gifts upon greeting, such as pens, foreign cigarettes, perfume, or shampoo are greatly appreciated by anyone, and can be used to indicate a desire for friendship....
2 pages (502 words) Essay
Abuses of corporate e-mail in this manner should be reported to a manager and the IT department immediately....
8 pages (2008 words) Essay
4. A super regulation agency must watch over all others. This might mean removing excess or smaller regulatory agencies that have redundant work. A third party organization should oversee and contribute to that agency....
1 pages (251 words) Essay
It does not only assist the user is using it with Television set, it even helps the user in using the product with different systems such as computer system. For example: on page 9, 10 and 11, the guide writer not only clearly informs the audience about the wires that come with the audio system, he/she even informs the audience about which wire will be used for what purpose....
1 pages (251 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!